From 9f4460f2e10d1c5036511b6deff7099598adf7f4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 21 Dec 2024 00:00:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/31xxx/CVE-2023-31279.json | 78 ++++++++++++++++++++++++++++++++-- 2023/31xxx/CVE-2023-31280.json | 78 ++++++++++++++++++++++++++++++++-- 2024/12xxx/CVE-2024-12886.json | 18 ++++++++ 2025/0xxx/CVE-2025-0103.json | 18 ++++++++ 2025/0xxx/CVE-2025-0104.json | 18 ++++++++ 2025/0xxx/CVE-2025-0105.json | 18 ++++++++ 2025/0xxx/CVE-2025-0106.json | 18 ++++++++ 2025/0xxx/CVE-2025-0107.json | 18 ++++++++ 2025/0xxx/CVE-2025-0108.json | 18 ++++++++ 2025/0xxx/CVE-2025-0109.json | 18 ++++++++ 2025/0xxx/CVE-2025-0110.json | 18 ++++++++ 2025/0xxx/CVE-2025-0111.json | 18 ++++++++ 2025/0xxx/CVE-2025-0112.json | 18 ++++++++ 2025/0xxx/CVE-2025-0113.json | 18 ++++++++ 2025/0xxx/CVE-2025-0114.json | 18 ++++++++ 2025/0xxx/CVE-2025-0115.json | 18 ++++++++ 2025/0xxx/CVE-2025-0116.json | 18 ++++++++ 2025/0xxx/CVE-2025-0117.json | 18 ++++++++ 2025/0xxx/CVE-2025-0118.json | 18 ++++++++ 2025/0xxx/CVE-2025-0119.json | 18 ++++++++ 2025/0xxx/CVE-2025-0120.json | 18 ++++++++ 2025/0xxx/CVE-2025-0121.json | 18 ++++++++ 2025/0xxx/CVE-2025-0122.json | 18 ++++++++ 2025/0xxx/CVE-2025-0123.json | 18 ++++++++ 2025/0xxx/CVE-2025-0124.json | 18 ++++++++ 2025/0xxx/CVE-2025-0125.json | 18 ++++++++ 2025/0xxx/CVE-2025-0126.json | 18 ++++++++ 2025/0xxx/CVE-2025-0127.json | 18 ++++++++ 2025/0xxx/CVE-2025-0128.json | 18 ++++++++ 2025/0xxx/CVE-2025-0129.json | 18 ++++++++ 2025/0xxx/CVE-2025-0130.json | 18 ++++++++ 2025/0xxx/CVE-2025-0131.json | 18 ++++++++ 2025/0xxx/CVE-2025-0132.json | 18 ++++++++ 2025/0xxx/CVE-2025-0133.json | 18 ++++++++ 2025/0xxx/CVE-2025-0134.json | 18 ++++++++ 2025/0xxx/CVE-2025-0135.json | 18 ++++++++ 2025/0xxx/CVE-2025-0136.json | 18 ++++++++ 2025/0xxx/CVE-2025-0137.json | 18 ++++++++ 2025/0xxx/CVE-2025-0138.json | 18 ++++++++ 2025/0xxx/CVE-2025-0139.json | 18 ++++++++ 2025/0xxx/CVE-2025-0140.json | 18 ++++++++ 2025/0xxx/CVE-2025-0141.json | 18 ++++++++ 42 files changed, 868 insertions(+), 8 deletions(-) create mode 100644 2024/12xxx/CVE-2024-12886.json create mode 100644 2025/0xxx/CVE-2025-0103.json create mode 100644 2025/0xxx/CVE-2025-0104.json create mode 100644 2025/0xxx/CVE-2025-0105.json create mode 100644 2025/0xxx/CVE-2025-0106.json create mode 100644 2025/0xxx/CVE-2025-0107.json create mode 100644 2025/0xxx/CVE-2025-0108.json create mode 100644 2025/0xxx/CVE-2025-0109.json create mode 100644 2025/0xxx/CVE-2025-0110.json create mode 100644 2025/0xxx/CVE-2025-0111.json create mode 100644 2025/0xxx/CVE-2025-0112.json create mode 100644 2025/0xxx/CVE-2025-0113.json create mode 100644 2025/0xxx/CVE-2025-0114.json create mode 100644 2025/0xxx/CVE-2025-0115.json create mode 100644 2025/0xxx/CVE-2025-0116.json create mode 100644 2025/0xxx/CVE-2025-0117.json create mode 100644 2025/0xxx/CVE-2025-0118.json create mode 100644 2025/0xxx/CVE-2025-0119.json create mode 100644 2025/0xxx/CVE-2025-0120.json create mode 100644 2025/0xxx/CVE-2025-0121.json create mode 100644 2025/0xxx/CVE-2025-0122.json create mode 100644 2025/0xxx/CVE-2025-0123.json create mode 100644 2025/0xxx/CVE-2025-0124.json create mode 100644 2025/0xxx/CVE-2025-0125.json create mode 100644 2025/0xxx/CVE-2025-0126.json create mode 100644 2025/0xxx/CVE-2025-0127.json create mode 100644 2025/0xxx/CVE-2025-0128.json create mode 100644 2025/0xxx/CVE-2025-0129.json create mode 100644 2025/0xxx/CVE-2025-0130.json create mode 100644 2025/0xxx/CVE-2025-0131.json create mode 100644 2025/0xxx/CVE-2025-0132.json create mode 100644 2025/0xxx/CVE-2025-0133.json create mode 100644 2025/0xxx/CVE-2025-0134.json create mode 100644 2025/0xxx/CVE-2025-0135.json create mode 100644 2025/0xxx/CVE-2025-0136.json create mode 100644 2025/0xxx/CVE-2025-0137.json create mode 100644 2025/0xxx/CVE-2025-0138.json create mode 100644 2025/0xxx/CVE-2025-0139.json create mode 100644 2025/0xxx/CVE-2025-0140.json create mode 100644 2025/0xxx/CVE-2025-0141.json diff --git a/2023/31xxx/CVE-2023-31279.json b/2023/31xxx/CVE-2023-31279.json index 58fc19b583b..6fe2cf66038 100644 --- a/2023/31xxx/CVE-2023-31279.json +++ b/2023/31xxx/CVE-2023-31279.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31279", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@sierrawireless.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered \ndevices on the AirVantage platform when the owner has not disabled the AirVantage Management \nService on the devices or registered the device. This could enable an attacker to configure, manage, \nand execute AT commands on an unsuspecting user\u2019s devices." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Sierra Wireless", + "product": { + "product_data": [ + { + "product_name": "AirVantage, AirVantage-Capable Devices: All Sierra Wireless devices.", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "Devices not registered in AirVantage with the AirVantage Management Service enabled." + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/", + "refsource": "MISC", + "name": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/31xxx/CVE-2023-31280.json b/2023/31xxx/CVE-2023-31280.json index 71a93f66f1c..2b1b6656c0e 100644 --- a/2023/31xxx/CVE-2023-31280.json +++ b/2023/31xxx/CVE-2023-31280.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-31280", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@sierrawireless.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An AirVantage online Warranty Checker tool vulnerability could allow an attacker to \nperform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial \nNumber in addition to the warranty status when the Serial Number or IMEI is used to look up \nwarranty status." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Sierra Wireless", + "product": { + "product_data": [ + { + "product_name": "AirVantage, AirVantage-Capable Devices: All Sierra Wireless devices.", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "All Sierra Wireless devices." + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/", + "refsource": "MISC", + "name": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/12xxx/CVE-2024-12886.json b/2024/12xxx/CVE-2024-12886.json new file mode 100644 index 00000000000..85b6a265dcb --- /dev/null +++ b/2024/12xxx/CVE-2024-12886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0103.json b/2025/0xxx/CVE-2025-0103.json new file mode 100644 index 00000000000..9ee9aac9c16 --- /dev/null +++ b/2025/0xxx/CVE-2025-0103.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0103", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0104.json b/2025/0xxx/CVE-2025-0104.json new file mode 100644 index 00000000000..29158b80619 --- /dev/null +++ b/2025/0xxx/CVE-2025-0104.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0104", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0105.json b/2025/0xxx/CVE-2025-0105.json new file mode 100644 index 00000000000..86295a7616d --- /dev/null +++ b/2025/0xxx/CVE-2025-0105.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0105", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0106.json b/2025/0xxx/CVE-2025-0106.json new file mode 100644 index 00000000000..1960193d3d6 --- /dev/null +++ b/2025/0xxx/CVE-2025-0106.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0106", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0107.json b/2025/0xxx/CVE-2025-0107.json new file mode 100644 index 00000000000..c3c6483a24a --- /dev/null +++ b/2025/0xxx/CVE-2025-0107.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0107", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0108.json b/2025/0xxx/CVE-2025-0108.json new file mode 100644 index 00000000000..a94904b971d --- /dev/null +++ b/2025/0xxx/CVE-2025-0108.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0108", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0109.json b/2025/0xxx/CVE-2025-0109.json new file mode 100644 index 00000000000..45a8495c687 --- /dev/null +++ b/2025/0xxx/CVE-2025-0109.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0109", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0110.json b/2025/0xxx/CVE-2025-0110.json new file mode 100644 index 00000000000..1094aa865e6 --- /dev/null +++ b/2025/0xxx/CVE-2025-0110.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0110", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0111.json b/2025/0xxx/CVE-2025-0111.json new file mode 100644 index 00000000000..280845bc0ef --- /dev/null +++ b/2025/0xxx/CVE-2025-0111.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0111", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0112.json b/2025/0xxx/CVE-2025-0112.json new file mode 100644 index 00000000000..09e6b28c990 --- /dev/null +++ b/2025/0xxx/CVE-2025-0112.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0112", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0113.json b/2025/0xxx/CVE-2025-0113.json new file mode 100644 index 00000000000..a6b1e2cdf18 --- /dev/null +++ b/2025/0xxx/CVE-2025-0113.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0113", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0114.json b/2025/0xxx/CVE-2025-0114.json new file mode 100644 index 00000000000..8eb118031cd --- /dev/null +++ b/2025/0xxx/CVE-2025-0114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0115.json b/2025/0xxx/CVE-2025-0115.json new file mode 100644 index 00000000000..d9c5a9d8fc8 --- /dev/null +++ b/2025/0xxx/CVE-2025-0115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0116.json b/2025/0xxx/CVE-2025-0116.json new file mode 100644 index 00000000000..6506e8961fe --- /dev/null +++ b/2025/0xxx/CVE-2025-0116.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0116", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0117.json b/2025/0xxx/CVE-2025-0117.json new file mode 100644 index 00000000000..ad179e510dd --- /dev/null +++ b/2025/0xxx/CVE-2025-0117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0118.json b/2025/0xxx/CVE-2025-0118.json new file mode 100644 index 00000000000..72a03f0034b --- /dev/null +++ b/2025/0xxx/CVE-2025-0118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0119.json b/2025/0xxx/CVE-2025-0119.json new file mode 100644 index 00000000000..bbc4dbe2895 --- /dev/null +++ b/2025/0xxx/CVE-2025-0119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0120.json b/2025/0xxx/CVE-2025-0120.json new file mode 100644 index 00000000000..4d28dbc7db3 --- /dev/null +++ b/2025/0xxx/CVE-2025-0120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0121.json b/2025/0xxx/CVE-2025-0121.json new file mode 100644 index 00000000000..a26f42d592c --- /dev/null +++ b/2025/0xxx/CVE-2025-0121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0122.json b/2025/0xxx/CVE-2025-0122.json new file mode 100644 index 00000000000..139ed1d1f09 --- /dev/null +++ b/2025/0xxx/CVE-2025-0122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0123.json b/2025/0xxx/CVE-2025-0123.json new file mode 100644 index 00000000000..3a4c3fda31c --- /dev/null +++ b/2025/0xxx/CVE-2025-0123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0124.json b/2025/0xxx/CVE-2025-0124.json new file mode 100644 index 00000000000..c6de1dd50e3 --- /dev/null +++ b/2025/0xxx/CVE-2025-0124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0125.json b/2025/0xxx/CVE-2025-0125.json new file mode 100644 index 00000000000..12f1083f4ea --- /dev/null +++ b/2025/0xxx/CVE-2025-0125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0126.json b/2025/0xxx/CVE-2025-0126.json new file mode 100644 index 00000000000..991e621b563 --- /dev/null +++ b/2025/0xxx/CVE-2025-0126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0127.json b/2025/0xxx/CVE-2025-0127.json new file mode 100644 index 00000000000..1be0c556b07 --- /dev/null +++ b/2025/0xxx/CVE-2025-0127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0128.json b/2025/0xxx/CVE-2025-0128.json new file mode 100644 index 00000000000..5f0974cc2f7 --- /dev/null +++ b/2025/0xxx/CVE-2025-0128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0129.json b/2025/0xxx/CVE-2025-0129.json new file mode 100644 index 00000000000..8709c4cfbf3 --- /dev/null +++ b/2025/0xxx/CVE-2025-0129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0130.json b/2025/0xxx/CVE-2025-0130.json new file mode 100644 index 00000000000..e7737af6f9a --- /dev/null +++ b/2025/0xxx/CVE-2025-0130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0131.json b/2025/0xxx/CVE-2025-0131.json new file mode 100644 index 00000000000..9cfbcbdc209 --- /dev/null +++ b/2025/0xxx/CVE-2025-0131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0132.json b/2025/0xxx/CVE-2025-0132.json new file mode 100644 index 00000000000..c9a3a1618ea --- /dev/null +++ b/2025/0xxx/CVE-2025-0132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0133.json b/2025/0xxx/CVE-2025-0133.json new file mode 100644 index 00000000000..b050425c2ed --- /dev/null +++ b/2025/0xxx/CVE-2025-0133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0134.json b/2025/0xxx/CVE-2025-0134.json new file mode 100644 index 00000000000..764b16d1fd9 --- /dev/null +++ b/2025/0xxx/CVE-2025-0134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0135.json b/2025/0xxx/CVE-2025-0135.json new file mode 100644 index 00000000000..30e24655904 --- /dev/null +++ b/2025/0xxx/CVE-2025-0135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0136.json b/2025/0xxx/CVE-2025-0136.json new file mode 100644 index 00000000000..486657b6fae --- /dev/null +++ b/2025/0xxx/CVE-2025-0136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0137.json b/2025/0xxx/CVE-2025-0137.json new file mode 100644 index 00000000000..287d7acf47b --- /dev/null +++ b/2025/0xxx/CVE-2025-0137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0138.json b/2025/0xxx/CVE-2025-0138.json new file mode 100644 index 00000000000..0b90db30876 --- /dev/null +++ b/2025/0xxx/CVE-2025-0138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0139.json b/2025/0xxx/CVE-2025-0139.json new file mode 100644 index 00000000000..8b9bb1b7fcc --- /dev/null +++ b/2025/0xxx/CVE-2025-0139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0140.json b/2025/0xxx/CVE-2025-0140.json new file mode 100644 index 00000000000..38a9e648e88 --- /dev/null +++ b/2025/0xxx/CVE-2025-0140.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0140", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0141.json b/2025/0xxx/CVE-2025-0141.json new file mode 100644 index 00000000000..25c126bf9b1 --- /dev/null +++ b/2025/0xxx/CVE-2025-0141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file